A Cyber Attack On Japan Could Bring The USA To War

US secretary of state Mike Pompeo recently declared that “a cyberattack could, in certain circumstances, constitute an armed attack under Article 5 of the US-Japan Security Treaty.” The security agreement, ratified after World War II, guarantees the United States’ defense in the event of an attack on Japan.

“This is significant from the perspective of deterrence,” said Japanese defense secretary Takeshi Iwaya, also present at the briefing.

In the first such meeting between Japanese and US defense officials since 2017, the two sides shared their concerns for stability in the region.

“Geopolitical competition and coercive attempts to undermine international rules, norms, and institutions, especially from China, present challenges to the alliance,” Pompeo said.

At a time when US lawmakers argue over what constitutes state-coordinated digital espionage, definitions are in order.

According to the Japanese Defence Ministry, a cyber-attack is an “abuse of information and communications networks” in the attempt to “access, steal, falsify or destroy information.” Defense against such attacks, there were almost 130b of them against Japan in 2016, has become a pressing issue for the Japanese government. With a majority of these attacks originating from China, it’s difficult to say how the US and Japan will now respond to them.

In a statement, from their defense officials, they said actions would be merited “on a case-by-case basis, and through close consultations.”

But difficulty in tracking responsible actors poses a challenge. In February, when the Australian parliament experienced an attack on its networks, there was speculation that the attempted breach originated from China. 

The attack “suggests a state actor because it’s hard to make money from breaching a parliamentary system,” said Fergus Hanson, head of the International Cyber Policy Center in Australia.

Until simple-to-understand evidence is possible in cyber-attacks, denying as slander will remain the status quo for world powers like China.

Meanwhile, defensive cooperation between allies like the US and Japan will continue behind the scenes.And it would appear that Japan can use all the help it can get. Late last year its minister of cybersecurity admitted not knowing how to use a computer and being confused as to what USB drives are.

Quartz

You Might Also Read:

NATO Could Go To War In Response To A Cyber Attack?:

 

 

« Hackers Delight: Poor Password Security
The CIA's Cloud Contract Is Worth Billions »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

CloudCheckr

CloudCheckr

CloudCheckr is a next-gen cloud management platform that unifies Security & Compliance, Inventory & Utilization and Cost Management.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.